ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Gemalto SafeNet KeySecure

    Sponsored by: Gemalto

    This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • 2015 the Year Data Breaches Got Personal

    Sponsored by: Gemalto

    Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.

  • Mobile is the New Playground for Thieves

    Sponsored by: IBM MaaS360

    You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.

  • Adapting an infosec program for emerging threats

    Sponsored by: Intel

    An enterprise's information security program must be adaptable to new threats and risks. Expert Nick Lewis explains how to update and evolve these programs in the following exclusive resource.

  • SB Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    Network firewall security must evolve to secure the extended enterprise. You need end-to-end network security that protects the entire attack surface from IoT to cloud. Take a more collaborative approach across your entire network infrastructure to deploy a dynamic, long term defense strategy.

  • Security essentials for CIO's enabling mobility - their device, your data

    Sponsored by: IBM MaaS360

    Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.

  • The State of Mobile Application Insecurity - Ponemon Institute Research Report

    Sponsored by: IBM MaaS360

    This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.

  • The Intricacies of Securing Data in the Cloud and How to Implement Policies Successfully

    Sponsored by: Intel

    This e-guide helps you put together a cloud security policy for your organization as your business practices rely more heavily on cloud storage. Access now for help with creating policies for storing and securing different data types, authorizing who can migrate data and choosing which applications can access your data.

  • Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides

    Sponsored by: Gemalto

    Encryption is the key to unsharing your sensitive data. Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest. Identify where your sensitive data lives to better understand your IT environment.

  • Market Focus Double Vision

    Sponsored by: Gigamon

    It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.

  • Ten ways to save money with IBM data protection

    Sponsored by: IBM

    Discover 10 ways you can employ your data protection system to help you organize files while addressing modern data protection challenges, and save money.

  • Five Tips to Make your Data Protection Strategy more proactive

    Sponsored by: Intel Security

    Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • Benefits of Building a Digital Business on an Integration Foundation

    Sponsored by: Axway

    As the number of connected "things" increases, enterprise data is becoming more vulnerable and waiting to be exploited. All this data needs to be managed and integrated into business processes to secure the future of your digital ecosystem.

  • E-Waste Is More Than Just Clutter

    Sponsored by: Iron Mountain

    Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • IT Guide: Windows 10 Migration Minus The Complexity

    Sponsored by: Druva Software

    With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.

  • Understanding How IBM Spectrum Protect Enables Hybrid Data Protection

    Sponsored by: IBM

    Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.

  • Your Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.

  • SOC Blog

    Sponsored by: Citrix

    This report contains detailed information about the design and operation of shared file systems put in place to protect customer data. Access now to learn how you can provide greater customer security assurance.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

  • How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements

    Sponsored by: Citrix

    To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.